Ethical Concerns and the Internet - Department of Computer and

12
2/14/2008 1 Ethical Concerns and the Ethical Concerns and the Internet Internet Goals Software Tools for Personal Productivity Prepared by: Dr. S. Bakke Cleveland State University Based on: PHIT Tip Ethical and Effective Internet Searching Pearson – Prentice Hall. 2007. Goals Goals 1. Ethical concerns involving the Internet. 1. Concept of Intellectual property. 2. Protecting Intellectual Property 3 Pl i i 3. Plagiarism 4. The Fair Use Doctrine 5. Documenting online sources 2. Effective Internet Searching 1. Search engines 2. Online databases 3. Additional scholarly sources 3. Social interaction in the Internet 1. Blogs 2. News Groups 3. RSS 4. MyFace / uTube ... 4. Conducting secure business in the Internet 1. Fair Business Practice 2. Secure channels (HTTPS and HTTP protocols)

Transcript of Ethical Concerns and the Internet - Department of Computer and

Page 1: Ethical Concerns and the Internet - Department of Computer and

2/14/2008

1

Ethical Concerns and the Ethical Concerns and the InternetInternetGoalsSoftware Tools for Personal ProductivityPrepared by: Dr. S. Bakke

Cleveland State University

Based on:

PHIT Tip Ethical and Effective Internet Searching

Pearson – Prentice Hall. 2007.

GoalsGoals1. Ethical concerns involving the Internet.

1. Concept of Intellectual property.2. Protecting Intellectual Property3 Pl i i3. Plagiarism4. The Fair Use Doctrine5. Documenting online sources

2. Effective Internet Searching1. Search engines2. Online databases3. Additional scholarly sources

3. Social interaction in the Internet1. Blogs2. News Groups3. RSS4. MyFace / uTube ...

4. Conducting secure business in the Internet1. Fair Business Practice2. Secure channels (HTTPS and HTTP protocols)

Page 2: Ethical Concerns and the Internet - Department of Computer and

2/14/2008

2

IntellectualIntellectual PropertyPropertyIntellectual property refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images and designs used in commerceimages, and designs used in commerce.

Two categories: 1. Industrial property, which includes inventions (patents), trademarks,

industrial designs, and geographic indications of source; and

1. Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings,

i i h h d l d hi l d i paintings, photographs and sculptures, and architectural designs.

______________Taken from: WIPO _ World Intellectual Property Organization website. 12-Feb-2008 URL: http://www.wipo.int/about-ip/en/

IntellectualIntellectual PropertyPropertyWhat is a patent?

A patent is an exclusive right granted for an invention, which is a product or a process that provides, in general, a new way of doing something, or offers a new p p g y g gtechnical solution to a problem.

What does a patent do?

A patent provides protection for the invention to the owner of the patent. The protection is granted for a limited period, generally 20 years.

What kind of Protection does a Patent offer?

Patent protection means that the invention cannot be commercially made, used, distributed or sold without the patent owner's consent. These patent rights are usually enforced in a court, which, in most systems, holds the authority to stop patent infringement. Conversely, a court can also declare a patent invalid upon a successful challenge by a third party.

______________Taken from: WIPO _ World Intellectual Property Organization website. 12-Feb-2008 URL: http://www.wipo.int/about-ip/en/

Page 3: Ethical Concerns and the Internet - Department of Computer and

2/14/2008

3

IntellectualIntellectual PropertyPropertyWhat is a trademark?

A d k i di i i i hi h id ifi i d A trademark is a distinctive sign which identifies certain goods or services as those produced or provided by a specific person or enterprise.

The system helps consumers identify and purchase a product or service because its nature and quality, indicated by its unique trademark.

______________Taken from: WIPO _ World Intellectual Property Organization website. 12-Feb-2008 URL: http://www.wipo.int/about-ip/en/

IntellectualIntellectual PropertyProperty

What is copyright?C i h i l l d ibi i h i f h i Copyright is a legal term describing rights given to creators for their literary and artistic works.

What is covered by copyright?The kinds of works covered by copyright include: literary works such as novels, poems, plays, reference works, newspapers and computer programs; databases; films, musical compositions, and choreography; artistic works such as paintings, drawings, photographs and sculpture; p g , g , p g p p ;architecture; and advertisements, maps and technical drawings.

A copyright usually lasts the lifetime of the creator plus 70 years.

______________Taken from: WIPO _ World Intellectual Property Organization website. 12-Feb-2008 URL: http://www.wipo.int/about-ip/en/

Page 4: Ethical Concerns and the Internet - Department of Computer and

2/14/2008

4

Ethical Concerns Involving the Ethical Concerns Involving the InternetInternet

1 Unauthorized Use of Intellectual Property1. Unauthorized Use of Intellectual Property

In the view of industrialized countries intellectual property rights must be respected to provide a fair return to the private investors who take the considerable risks involved in developing and commercializing a new technology. Unless such returns are available, the incentives for inventive and innovative activity will be impaired, to the detriment of all nations, rich or poor [*]or poor. [ ]

2. Unauthorized Access to Personal Information

_________________[*] Mansfield, Edwin. Unauthorized Use of Intellectual Property: Effects on Investment, Technology Transfer, and Innovation. The National Academies Press. Accessed 12-Feb-2008 at http://www.nap.edu/openbook.php?record_id=2054&page=107

Violating Copyright *Violating Copyright *

Examples of violations punishable by law

◦ Copying a paper that someone else has written◦ Copying a paper that someone else has written◦ Copying and distributing digital music files◦ Downloading the copy of a movie◦ Copying a software program and giving to others

ResourcesEl i F i F d i ffElectronic Frontier Foundation: www.eff.orgUS Copyright Office: www.copyright.gov

______________* Copyright is defined in Title 17 of the United States Code.

Page 5: Ethical Concerns and the Internet - Department of Computer and

2/14/2008

5

PlagiarismPlagiarismto steal and pass off the ideas or words of another as one's own to use another's production/creation without crediting the source to commit literary theft to present as new and original an idea or product derived from an existing source.

Plagiarism is an act of fraud. It involves both stealing someone else's work and lying about it afterward.

Plagiarism ExamplesPlagiarism Examples

1. Wholesale copyingCopying an entire article or long sections of an Copying an entire article or long sections of an article word by word.

2. ParaphrasingRewording the unique ideas of another author

3. Making up sourcesI ti fi ti l t i t f iti Inventing fictional quotes in support for a position or idea.

Page 6: Ethical Concerns and the Internet - Department of Computer and

2/14/2008

6

Detecting PlagiarismDetecting Plagiarism

1. Google it

2. Anti-plagiarism websites◦ Turnitin.com – students◦ 411.com – find people◦ Ithenticate.com – corporations◦ uspto.gov – Patents & Trademarks ◦ wipo.int – International version of USPTO

Detecting PlagiarismDetecting Plagiarism

1. Google it

2. Anti-plagiarism websites◦ Turnitin.com – students◦ 411.com – find people◦ Ithenticate.com – corporations◦ uspto.gov – Patents & Trademarks ◦ wipo.int – International version of USPTO

Page 7: Ethical Concerns and the Internet - Department of Computer and

2/14/2008

7

Detecting PlagiarismDetecting Plagiarism

Example: Using Turnitin.com tool

Detecting PlagiarismDetecting Plagiarism

Example: Checking a commercial phrase

Page 8: Ethical Concerns and the Internet - Department of Computer and

2/14/2008

8

The Fair Use DoctrineThe Fair Use Doctrine

Students and faculty may use brief portions of other’s people contributions as long as

credits be given to the original source and the user doesn’t profit from the original material.

Larger portions usually require the author’s permission.

Avoiding PlagiarismAvoiding PlagiarismCite your sources!

1 American Psychological Association (APA) format1. American Psychological Association (APA) format

Kenneth, I. A. (2000). A Buddhist response to the nature of human rights. Journal of Buddhist Ethics, 8(4). Retrieved February 20, 2001, from http://www.cac.psu.edu/jbe/twocont.html

2. Modern Language Association (MLA) format

Joyce, Michael. "On the Birthday of the Stranger (in Memory of John Hawkes)." Evergreen Review 5 Mar. 1999. 12 May 1999 <http://www.evergreenreview.com/102/evexcite/joyce/nojoyce.html>.

Page 9: Ethical Concerns and the Internet - Department of Computer and

2/14/2008

9

Effective Internet SearchingEffective Internet SearchingSearching is usually driven by keywords. You may request: text, images, video, sound, etc.

Search Engines

www.google.comwww.live.comwww.ask.comsearch.yahoo.comwww.altavista.com

Academic Internet SearchingAcademic Internet SearchingHigh quality research material for academic purposes should be found using a specialized library search.

Search Engines

www.google.com[ Choose: More | Scholar ]

http://www.ohiolink.edu/

http://citeseer.ist.psu.edu/

Page 10: Ethical Concerns and the Internet - Department of Computer and

2/14/2008

10

Internet ResourcesInternet Resources

Encyclopedia

www.wikipedia.orgencarta.msn.com

Dictionarieswww.m-w.comwww.dictionary.com

Government www.usps.orgwww.census.gov

Unauthorized Access to Personal InformationUnauthorized Access to Personal Information

1. Identity theftIdentity theft occurs when someone uses your personally e t ty t e t occu s w e so eo e uses you pe so a y identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.

[more at FTC site: http://www.ftc.gov/bcp/edu/microsites/idtheft/]

Page 11: Ethical Concerns and the Internet - Department of Computer and

2/14/2008

11

Unauthorized Access to Personal InformationUnauthorized Access to Personal Information

2. Personal ProfilingThe use of computers to combine data from

l l d l d f multiple sources and create electronic dossiers of detailed information on individuals.[Bureau Motor Vehicles, Police, Courts, Financial service firms, phone directories, loan application forms, college boards: graduating seniors, …]Examples: doubleClick.net, usadata.com, h i i ichoicepoint.com, acxiom.com.

3. Unwanted intrusionsSpam.

Taken from: Management Information Systems: Managing the Digital Firm, 10th Edition, by KennnethLaudon and Jane Laudon. Pearson-Prentice Hall, New Jersey 2007.

Fair Information Practice PrinciplesFair Information Practice Principles

1. Notice / awareness: Consumers should be given notice of an entity’s information practices before any personal information is collected from them.

2. Choice / consent: opt-in / opt-out3. Access / participation : Individuals should be

allowed to access information about themselves and contest its accuracy.

4. Enforcement / redness: mechanisms to enforce 4. Enforcement / redness: mechanisms to enforce the law, self-regulation, civil & criminal sanctions.

Accessed on Feb 13, 2008 at URL www.FTC.gov/reports/privacy/faiInfo.shtm

Page 12: Ethical Concerns and the Internet - Department of Computer and

2/14/2008

12

Unauthorized Access to Personal InformationUnauthorized Access to Personal Information

Techniques for obtaining personal informationIn most cases, a criminal needs to obtain personal information or documents about an individual in order to impersonate them. They may do this by:

Stealing mail or rummaging through rubbish.

Retrieving information from redundant equipment which has been disposed of.

Stealing payment or identification cards, either by pick-pocketing or surreptitiously by skimming through a compromised card reader

Remotely reading information from an RFID chip on a smartcard, RFID-enabled credit card, or passport

Eavesdropping on public transactions to obtain personal data.

Stealing personal information in computer databases.

Advertising bogus job offers (either full-time or work from home based) to which the victims will reply with their full name, address, curriculum vitae, telephone numbers, and banking details

I filt ti f i ti th t t l t f l i f ti Infiltration of organizations that store large amounts of personal information

Impersonating a trusted organization in an electronic communication (phishing)

Obtaining castings of fingers for falsifying fingerprint identification.

Browsing social network (MySpace, Facebook, Bebo etc) sites, online for personal details that have been posted by users

Simply researching about the victim in government registers, at the Internet, Google, and so on.

___________________

Taken from www.wikipedia.com on Feb 12 2008.

ConclusionConclusion

1. Be mindful of using other’s intellectual propertyproperty◦ Plagiarism◦ Cite any sources you use

2 U h i d A P l 2. Unauthorized Access to Personal Information◦ Fair information practices◦ Be aware when disclosing personal information